What two mechanisms are used to redirect users to a web portal to authenticate to ISE for guest services? (Choose two)

What two mechanisms are used to redirect users to a web portal to authenticate to ISE for guest services? (Choose two)A . multiple factor authB . local web authC . single sign-onD . central web authE . TACACS+View AnswerAnswer: B,D

June 17, 2022 No Comments READ MORE +

Which action should be taken to accomplish this goal?

An engineer is trying to securely connect to a router and wants to prevent insecure algorithms from being used. However, the connection is failing . Which action should be taken to accomplish this goal?A . Disable telnet using the no ip telnet command.B . Enable the SSH server using the...

June 17, 2022 No Comments READ MORE +

Which information is required when adding a device to Firepower Management Center?

Which information is required when adding a device to Firepower Management Center?A . username and passwordB . encryption methodC . device serial numberD . registration keyView AnswerAnswer: D

June 17, 2022 No Comments READ MORE +

An MDM provides which two advantages to an organization with regards to device management? (Choose two)

An MDM provides which two advantages to an organization with regards to device management? (Choose two)A . asset inventory managementB . allowed application managementC . Active Directory group policy managementD . network device managementE . critical device managementView AnswerAnswer: A,B

June 16, 2022 No Comments READ MORE +

What does the API do when connected to a Cisco security appliance?

Refer to the exhibit. What does the API do when connected to a Cisco security appliance?A . get the process and PID information from the computers in the networkB . create an SNMP pull mechanism for managing AMPC . gather network telemetry information from AMP for endpointsD . gather the...

June 16, 2022 No Comments READ MORE +

In a PaaS model, which layer is the tenant responsible for maintaining and patching?

In a PaaS model, which layer is the tenant responsible for maintaining and patching?A . hypervisorB . virtual machineC . networkD . applicationView AnswerAnswer: D

June 16, 2022 No Comments READ MORE +

When Cisco and other industry organizations publish and inform users of known security findings and vulnerabilities, which name is used?

When Cisco and other industry organizations publish and inform users of known security findings and vulnerabilities, which name is used?A . Common Security ExploitsB . Common Vulnerabilities and ExposuresC . Common Exploits and VulnerabilitiesD . Common Vulnerabilities, Exploits and ThreatsView AnswerAnswer: B Explanation: Reference: CCNP And CCIE Security Core SCOR...

June 16, 2022 No Comments READ MORE +

What provides visibility and awareness into what is currently occurring on the network?

What provides visibility and awareness into what is currently occurring on the network?A . CMXB . WMIC . Prime InfrastructureD . TelemetryView AnswerAnswer: D Explanation: Reference: https://www.cisco.com/c/dam/en_us/about/doing_business/legal/service_descriptions/docs/activethreat-analytics-premier.pdf

June 16, 2022 No Comments READ MORE +

What are two rootkit types? (Choose two)

What are two rootkit types? (Choose two)A . registryB . virtualC . bootloaderD . user modeE . buffer modeView AnswerAnswer: C,D Explanation: The term ‘rootkit’ originally comes from the Unix world, where the word ‘root’ is used to describe a user with the highest possible level of access privileges, similar...

June 16, 2022 No Comments READ MORE +

Which two preventive measures are used to control cross-site scripting? (Choose two)

Which two preventive measures are used to control cross-site scripting? (Choose two)A . Enable client-side scripts on a per-domain basis.B . Incorporate contextual output encoding/escaping.C . Disable cookie inspection in the HTML inspection engine.D . Run untrusted HTML input through an HTML sanitization engine.E . Same Site cookie attribute should...

June 16, 2022 No Comments READ MORE +